SlideShare a Scribd company logo
Lessons Learned from
CloudLock’s Cyberlab report
The 1% Who Can Take Down
Your Organization
1
Presenters
Bernd Leger
VP of Marketing
Ayse Kaya Firat
Director of Customer Insights & Analytics
2
Continuing Professional Education (CPE) Credits
Claim your CPE credit for attending this webinar
https://www.isc2.org/
For more information or questions please contact us
info@cloudlock.com
3
Q3 2015 Cloudlock Cyberlab Report
Agenda
01
02
03
04
What CISO’s care about
Account Compromise - Focus on the 1%
Data Breaches - Protect What Matters
Cloud Malware - The Backdoor
5
05 Summary
What CISOs Care About
6
IDENTITY
ACCOUNTS APPS
DATA
CLOUD
DEVICE
Cloud Cybersecurity - Where You Should Focus
7
APPSACCOUNTS
DATA
Cloud Malware
(Apps Discovery &
Control)
Data Breach
(Cloud DLP)
4
Compliance
(Reporting/Policy)
5
SecOps & Forensics
(Security Admin)
3
2
Compromised
Accounts
(UBA)
1
7
8
Scope of Cybersecurity Report
91,000
APPS
DISCOVERED
10 Million
ACTIVE
USERS
FILES
MONITORED
DAILY
1 Billion
CloudLock Confidential
The 1% who can take down your Organization: Disproportionate Cloud Risk
9
01
10
Account Compromises -
Focusing on the User
“
User Behavior Analytics No Longer a Nice to Have
Gartner explains "By 2018, at least 25% of
self-discovered enterprise breaches will be
found using user behavior analytics (UBA)."
Gartner, Best Practices and Success Stories for User Behavior Analytics, March 2015
11
1 in 4 users violate corporate security policy
12
The 1% Who Can Take Down Your Organization
13
No Industry is Immune
Customer Story -The True Risk of Data Dense Users
14
Hi-Tech customer based in the
Silicon Valley
Highly confidential IP:
● Design docs
● Patents
● Engineering code
Customer Story - Rapid ROI
15
● US based company in the
travel industry.
● 62% of decrease in public
exposures in one day by
leveraging UBA
● Reached out to top users
with public exposures
● Rapid return on investment
● Revealed gaps in employee
security training
Recommendations - Account Compromise
16
1. Identify: Who are the riskiest
users? Plus, what is typical user
behavior, what is not?
2. Segment: Understand the
composition of the riskiest top
1%
3. Prioritize: For highest ROI,
streamline automated action
upon anomaly detection
02
17
Data Breach
Identify data that matters
18
There are only two types of data that exist in your organization:
1) Data that someone wants to steal
2) Everything else
Source: Forrester Research
How successful organizations attack the problem?
19
Organizations are taking two main approaches to protect their most sensitive corporate assets:
Data Types Organizations worry about
20
● Many enterprises live in
fear of suffering from a
toxic data spill.
21
Exposed Sensitive Data
● Just like asbestos, certain
data types becomes even
more toxic when airborne.
● 6% of collaboration is occurring
inbound-only, suggesting the potential
malicious use of collaboration as a
mechanism to execute phishing attacks.
Anatomy of a Cyber Attack
Direction of Communication Matters
22
Web of Collaborating Business & Cybercrime
23
Web of Collaborating Business & Cybercrime
24
And - the top 25 account for 75% of cloud based sharing
Customer Story - Not All Collaboration is Good Collaboration
25
● High profile
government
agency
● 5M Documents,
20K Users
Recommendations - Data Breaches
26
1. Monitor the environment
continuously
2. Gain deep insight into what data
is shared and how it is shared
3. Prioritize/analyze the most
collaborative domains
4. Take risk appropriate controls.
Not all files are equally important
- encrypt assets that matter the
most
Customer Story 16.3% Improvement in 1 Day
27
03
28
Cloud Malware
CloudLock focuses on the riskiest apps
29
● User enabled 3rd party apps that communicate with core, corporate SaaS platforms. These
apps typically request permission via an OAuth connection to act on behalf of the user.
● Frequently targeted by cybercriminals as an entry point to organizations.
DEMO
● UK media company
● 5000+ users adopted
cloud collaboration
● Over 600 unique apps,
20,000 installs
Customer Case Study - Risky (App) Business
30
1% of users account for 62% of all app installs
31
● The number of 3rd party apps grew
significantly.
○ 130 to 540 in just one year!
● 52,000 app installs are done by highly
privileged users.
Top 25 Unique Apps Comprise 65% of All Installs
32
● In most instances, top apps are tied to business functions
● The long tail is where the risk lies
[37%] Gaming, Entertainment, Non Productivity
33
Top Third-Party Apps
Gaming / Entertainment / Non-Productivity Apps
Recon - Person / Location / Activity / Relevance
Keys to the Kingdom: Third Party Apps
CloudLock focuses on the riskiest apps
● Third-party cloud apps are user-enabled SaaS apps that communicate with core, corporate SaaS
platforms via an OAuth connection.
Keys to the Kingdom: Third Party Apps
CloudLock focuses on the riskiest apps
● Third-party cloud apps are user-enabled SaaS apps that communicate with core, corporate SaaS
platforms via an OAuth connection.
Keys to the Kingdom: Third Party Apps
Recommendations - Cloud Malware
38
1. Understand which apps your users are leveraging -
understand the need behind
2. Prioritize highly privileged users’ app installs
3. Empower the end users by educating them on the risk
of 3rd party apps
4. Trust the insight of the security community, tap into
crowdsourced insight for 3rd party apps
03
39
Summary
Cloud Cybersecurity - Where You Should Focus
40
APPSACCOUNTS
DATA
Cloud Malware
(Apps Discovery &
Control)
Data Breach
(Cloud DLP)
4
Compliance
(Reporting/Policy)
5
SecOps & Forensics
(Security Admin)
3
2
Compromised
Accounts
(UBA)
1
40
CloudLock CyberSecurity Fabrics
ITSecurity
Homegrown Apps
IT Apps
ISV Cloud Apps
Enterprise
SaaS
force.com
All End - Users 41
PaaS and IaaS
force.com
IDaaS
CloudLock Confidential
Content
Classification
Apps
Firewall
Security
Analytics
Encryption
Management
Incident
Management
Central
Auditing
Policy
Automation
User Behavior
Analytics
Configuration
Security
Next Step: Get a Cybersecurity Assessment
bit.ly/cloudlock-assessment
Q&A
Bernd Leger
VP of Marketing
Ayse Kaya Firat
Director of Customer
Insights & Analytics
43
Thank You
Questions & Answers
www.cloudlock.com info@cloudlock.com 781.996.4332
44

More Related Content

What's hot

The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
Sai Huda
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
Forcepoint LLC
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
Bitglass
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
Bitglass
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
David J Rosenthal
 
Cyber security trends 2018
Cyber security trends 2018Cyber security trends 2018
Cyber security trends 2018
Ruchi Vishwakarma
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
Bitglass
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
Netskope
 
20181115 O365 connect protecting your data in office 365
20181115 O365 connect protecting your data in office 36520181115 O365 connect protecting your data in office 365
20181115 O365 connect protecting your data in office 365
Arjan Cornelissen
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
David J Rosenthal
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
Symantec
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
Forcepoint LLC
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Microsoft Österreich
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedElastica Inc.
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
SrikanthRaju7
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Netskope
 
20181110 sps leicester connect protecting your data in office 365
20181110 sps leicester connect protecting your data in office 36520181110 sps leicester connect protecting your data in office 365
20181110 sps leicester connect protecting your data in office 365
Arjan Cornelissen
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
Forcepoint LLC
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
Elastica Inc.
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Cloudflare
 

What's hot (20)

The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Cyber security trends 2018
Cyber security trends 2018Cyber security trends 2018
Cyber security trends 2018
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
 
20181115 O365 connect protecting your data in office 365
20181115 O365 connect protecting your data in office 36520181115 O365 connect protecting your data in office 365
20181115 O365 connect protecting your data in office 365
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
20181110 sps leicester connect protecting your data in office 365
20181110 sps leicester connect protecting your data in office 36520181110 sps leicester connect protecting your data in office 365
20181110 sps leicester connect protecting your data in office 365
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 

Viewers also liked

Lop11(mon thu)-6-7-15
Lop11(mon thu)-6-7-15Lop11(mon thu)-6-7-15
Lop11(mon thu)-6-7-15
Vu Thanh Cong
 
Reproducibility for IR evaluation
Reproducibility for IR evaluationReproducibility for IR evaluation
Reproducibility for IR evaluation
Research Data Alliance
 
Concesiones y revalidaciones en materia de verificacion vehicular
Concesiones y revalidaciones en materia de verificacion vehicularConcesiones y revalidaciones en materia de verificacion vehicular
Concesiones y revalidaciones en materia de verificacion vehicularD3TLAX
 
Lop11(mon thu)-2-7-15
Lop11(mon thu)-2-7-15Lop11(mon thu)-2-7-15
Lop11(mon thu)-2-7-15
Vu Thanh Cong
 
INBURSA MÉDICOS
INBURSA MÉDICOSINBURSA MÉDICOS
INBURSA MÉDICOS
jvieyra
 
Intro to visual art 4 online
Intro to visual art 4 onlineIntro to visual art 4 online
Intro to visual art 4 online
Dr-Frank-Latimer
 
Jdc
JdcJdc
pros & cons Of Pharmaceutical Industry In INDIA-2011
pros & cons Of Pharmaceutical Industry In INDIA-2011pros & cons Of Pharmaceutical Industry In INDIA-2011
pros & cons Of Pharmaceutical Industry In INDIA-2011
Raghava Reddy
 
Baro volutrauma
Baro volutraumaBaro volutrauma
Baro volutrauma
madelin Guerra
 
Đáp án chính thức môn Hóa - Khối B - Kỳ thi Đại học năm 2011
Đáp án chính thức môn Hóa - Khối B - Kỳ thi Đại học năm 2011Đáp án chính thức môn Hóa - Khối B - Kỳ thi Đại học năm 2011
Đáp án chính thức môn Hóa - Khối B - Kỳ thi Đại học năm 2011
dethinet
 

Viewers also liked (13)

Web Development Phases
Web Development PhasesWeb Development Phases
Web Development Phases
 
Lop11(mon thu)-6-7-15
Lop11(mon thu)-6-7-15Lop11(mon thu)-6-7-15
Lop11(mon thu)-6-7-15
 
Reproducibility for IR evaluation
Reproducibility for IR evaluationReproducibility for IR evaluation
Reproducibility for IR evaluation
 
Concesiones y revalidaciones en materia de verificacion vehicular
Concesiones y revalidaciones en materia de verificacion vehicularConcesiones y revalidaciones en materia de verificacion vehicular
Concesiones y revalidaciones en materia de verificacion vehicular
 
Lop11(mon thu)-2-7-15
Lop11(mon thu)-2-7-15Lop11(mon thu)-2-7-15
Lop11(mon thu)-2-7-15
 
DaniePTAWUGletter
DaniePTAWUGletterDaniePTAWUGletter
DaniePTAWUGletter
 
INBURSA MÉDICOS
INBURSA MÉDICOSINBURSA MÉDICOS
INBURSA MÉDICOS
 
Intro to visual art 4 online
Intro to visual art 4 onlineIntro to visual art 4 online
Intro to visual art 4 online
 
Jdc
JdcJdc
Jdc
 
pros & cons Of Pharmaceutical Industry In INDIA-2011
pros & cons Of Pharmaceutical Industry In INDIA-2011pros & cons Of Pharmaceutical Industry In INDIA-2011
pros & cons Of Pharmaceutical Industry In INDIA-2011
 
Baro volutrauma
Baro volutraumaBaro volutrauma
Baro volutrauma
 
Đáp án chính thức môn Hóa - Khối B - Kỳ thi Đại học năm 2011
Đáp án chính thức môn Hóa - Khối B - Kỳ thi Đại học năm 2011Đáp án chính thức môn Hóa - Khối B - Kỳ thi Đại học năm 2011
Đáp án chính thức môn Hóa - Khối B - Kỳ thi Đại học năm 2011
 
Neonato ppt FINAL
Neonato ppt FINALNeonato ppt FINAL
Neonato ppt FINAL
 

Similar to The 1% Who Can Take Down your Organization

What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
Allot Communications
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
Bitglass
 
AWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI reportAWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Storage Switzerland
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Bitglass
 
Cscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-surveyCscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-survey
George Wainblat
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Enterprise Management Associates
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
Blancco
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
IBM Security
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Argyle Executive Forum
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
CSNP
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
Shadow IT
Shadow ITShadow IT
Shadow IT
PriyaPandey162
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
VMUG IT
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Prime Infoserv
 
Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013
Appinions
 

Similar to The 1% Who Can Take Down your Organization (20)

What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
 
AWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI reportAWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI report
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
Cscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-surveyCscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-survey
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

The 1% Who Can Take Down your Organization

  • 1. Lessons Learned from CloudLock’s Cyberlab report The 1% Who Can Take Down Your Organization 1
  • 2. Presenters Bernd Leger VP of Marketing Ayse Kaya Firat Director of Customer Insights & Analytics 2
  • 3. Continuing Professional Education (CPE) Credits Claim your CPE credit for attending this webinar https://www.isc2.org/ For more information or questions please contact us info@cloudlock.com 3
  • 4. Q3 2015 Cloudlock Cyberlab Report
  • 5. Agenda 01 02 03 04 What CISO’s care about Account Compromise - Focus on the 1% Data Breaches - Protect What Matters Cloud Malware - The Backdoor 5 05 Summary
  • 6. What CISOs Care About 6 IDENTITY ACCOUNTS APPS DATA CLOUD DEVICE
  • 7. Cloud Cybersecurity - Where You Should Focus 7 APPSACCOUNTS DATA Cloud Malware (Apps Discovery & Control) Data Breach (Cloud DLP) 4 Compliance (Reporting/Policy) 5 SecOps & Forensics (Security Admin) 3 2 Compromised Accounts (UBA) 1 7
  • 8. 8 Scope of Cybersecurity Report 91,000 APPS DISCOVERED 10 Million ACTIVE USERS FILES MONITORED DAILY 1 Billion CloudLock Confidential
  • 9. The 1% who can take down your Organization: Disproportionate Cloud Risk 9
  • 11. “ User Behavior Analytics No Longer a Nice to Have Gartner explains "By 2018, at least 25% of self-discovered enterprise breaches will be found using user behavior analytics (UBA)." Gartner, Best Practices and Success Stories for User Behavior Analytics, March 2015 11
  • 12. 1 in 4 users violate corporate security policy 12
  • 13. The 1% Who Can Take Down Your Organization 13 No Industry is Immune
  • 14. Customer Story -The True Risk of Data Dense Users 14 Hi-Tech customer based in the Silicon Valley Highly confidential IP: ● Design docs ● Patents ● Engineering code
  • 15. Customer Story - Rapid ROI 15 ● US based company in the travel industry. ● 62% of decrease in public exposures in one day by leveraging UBA ● Reached out to top users with public exposures ● Rapid return on investment ● Revealed gaps in employee security training
  • 16. Recommendations - Account Compromise 16 1. Identify: Who are the riskiest users? Plus, what is typical user behavior, what is not? 2. Segment: Understand the composition of the riskiest top 1% 3. Prioritize: For highest ROI, streamline automated action upon anomaly detection
  • 18. Identify data that matters 18 There are only two types of data that exist in your organization: 1) Data that someone wants to steal 2) Everything else Source: Forrester Research
  • 19. How successful organizations attack the problem? 19 Organizations are taking two main approaches to protect their most sensitive corporate assets:
  • 20. Data Types Organizations worry about 20 ● Many enterprises live in fear of suffering from a toxic data spill.
  • 21. 21 Exposed Sensitive Data ● Just like asbestos, certain data types becomes even more toxic when airborne.
  • 22. ● 6% of collaboration is occurring inbound-only, suggesting the potential malicious use of collaboration as a mechanism to execute phishing attacks. Anatomy of a Cyber Attack Direction of Communication Matters 22
  • 23. Web of Collaborating Business & Cybercrime 23
  • 24. Web of Collaborating Business & Cybercrime 24 And - the top 25 account for 75% of cloud based sharing
  • 25. Customer Story - Not All Collaboration is Good Collaboration 25 ● High profile government agency ● 5M Documents, 20K Users
  • 26. Recommendations - Data Breaches 26 1. Monitor the environment continuously 2. Gain deep insight into what data is shared and how it is shared 3. Prioritize/analyze the most collaborative domains 4. Take risk appropriate controls. Not all files are equally important - encrypt assets that matter the most
  • 27. Customer Story 16.3% Improvement in 1 Day 27
  • 29. CloudLock focuses on the riskiest apps 29 ● User enabled 3rd party apps that communicate with core, corporate SaaS platforms. These apps typically request permission via an OAuth connection to act on behalf of the user. ● Frequently targeted by cybercriminals as an entry point to organizations. DEMO
  • 30. ● UK media company ● 5000+ users adopted cloud collaboration ● Over 600 unique apps, 20,000 installs Customer Case Study - Risky (App) Business 30
  • 31. 1% of users account for 62% of all app installs 31 ● The number of 3rd party apps grew significantly. ○ 130 to 540 in just one year! ● 52,000 app installs are done by highly privileged users.
  • 32. Top 25 Unique Apps Comprise 65% of All Installs 32 ● In most instances, top apps are tied to business functions ● The long tail is where the risk lies
  • 33. [37%] Gaming, Entertainment, Non Productivity 33 Top Third-Party Apps Gaming / Entertainment / Non-Productivity Apps
  • 34. Recon - Person / Location / Activity / Relevance
  • 35. Keys to the Kingdom: Third Party Apps CloudLock focuses on the riskiest apps ● Third-party cloud apps are user-enabled SaaS apps that communicate with core, corporate SaaS platforms via an OAuth connection.
  • 36. Keys to the Kingdom: Third Party Apps CloudLock focuses on the riskiest apps ● Third-party cloud apps are user-enabled SaaS apps that communicate with core, corporate SaaS platforms via an OAuth connection.
  • 37. Keys to the Kingdom: Third Party Apps
  • 38. Recommendations - Cloud Malware 38 1. Understand which apps your users are leveraging - understand the need behind 2. Prioritize highly privileged users’ app installs 3. Empower the end users by educating them on the risk of 3rd party apps 4. Trust the insight of the security community, tap into crowdsourced insight for 3rd party apps
  • 40. Cloud Cybersecurity - Where You Should Focus 40 APPSACCOUNTS DATA Cloud Malware (Apps Discovery & Control) Data Breach (Cloud DLP) 4 Compliance (Reporting/Policy) 5 SecOps & Forensics (Security Admin) 3 2 Compromised Accounts (UBA) 1 40
  • 41. CloudLock CyberSecurity Fabrics ITSecurity Homegrown Apps IT Apps ISV Cloud Apps Enterprise SaaS force.com All End - Users 41 PaaS and IaaS force.com IDaaS CloudLock Confidential Content Classification Apps Firewall Security Analytics Encryption Management Incident Management Central Auditing Policy Automation User Behavior Analytics Configuration Security
  • 42. Next Step: Get a Cybersecurity Assessment bit.ly/cloudlock-assessment
  • 43. Q&A Bernd Leger VP of Marketing Ayse Kaya Firat Director of Customer Insights & Analytics 43
  • 44. Thank You Questions & Answers www.cloudlock.com info@cloudlock.com 781.996.4332 44